First published: Thu Jul 08 2021(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trend Micro Password Manager. Authentication is required to exploit this vulnerability. The specific flaw exists within the Trend Micro Password Manager Central Control Service. The issue results from the exposure of a dangerous method or function to unprivileged users. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM.
Credit: security@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trendmicro Password Manager | <=5.0.0.1217 | |
Microsoft Windows | ||
Trend Micro Password Manager |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32462 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2021-32462, update your Trend Micro Password Manager to version 5.0.0.1218 or later.
CVE-2021-32462 affects installations of Trend Micro Password Manager up to version 5.0.0.1217.
CVE-2021-32462 enables remote attackers to execute arbitrary code on affected systems.
Yes, authentication is required to exploit CVE-2021-32462.